Author: Michael K. Reiter
Publication Overview
Publication period start: 2011
Number of co-authors: 22
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Reiter,
Michael K.,
Rohatgi,
Pankaj
(2004):
Homeland Security.
In
IEEE Internet Computing,
8
(6)
pp. 16-17.
https://doi.ieeecomputersociety.org/10.1109/MIC.2004.62
Reiter,
Michael K.
(1999):
High-Confidence Distributed Systems - Guest Editor\'s Introduction.
In
IEEE Internet Computing,
3
(6)
pp. 52-54.
Reiter,
Michael K.,
Rubin,
Aviel D.
(1999):
Anonymous Web Transactions with Crowds.
In
Communications of the ACM,
42
(2)
pp. 32-38.
https://dl.acm.org/doi/10.1145/293411.293778
Reiter,
Michael K.
(1996):
Distributed Trust with the Rampart Toolkit.
In
Communications of the ACM,
39
(4)
pp. 71-74.
Bauer,
Lujo,
Cranor,
Lorrie Faith,
Reeder,
Robert W.,
Reiter,
Michael K.,
Vaniea,
Kami
(2008):
A user study of policy creation in a flexible access-control system.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 543-552.
https://doi.acm.org/10.1145/1357054.1357143
Reeder,
Robert W.,
Bauer,
Lujo,
Cranor,
Lorrie Faith,
Reiter,
Michael K.,
Bacon,
Kelli,
How,
Keisha,
Strong,
Heather
(2008):
Expandable grids for visualizing and authoring computer security policies.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 1473-1482.
https://doi.acm.org/10.1145/1357054.1357285
Bauer,
Lujo,
Cranor,
Lorrie Faith,
Reiter,
Michael K.,
Vaniea,
Kami
(2007):
Lessons learned from the deployment of a smartphone-based access-control system.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 64-75.
https://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf
Bauer,
Lujo,
Cranor,
Lorrie Faith,
Reeder,
Robert W.,
Reiter,
Michael K.,
Vaniea,
Kami
(2009):
Real life challenges in access-control management.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 899-908.
https://doi.acm.org/10.1145/1518701.1518838
Mazurek,
Michelle L.,
Arsenault,
J. P.,
Bresee,
Joanna,
Gupta,
Nitin,
Ion,
Iulia,
Johns,
Christina,
Lee,
Daniel,
Liang,
Yuan,
Olsen,
Jenny,
Salmon,
Brandon,
Shay,
Richard,
Vaniea,
Kami,
Bauer,
Lujo,
Cranor,
Lorrie Faith,
Ganger,
Gregory R.,
Reiter,
Michael K.
(2010):
Access control for home data sharing: evaluating social acceptability.
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 645-654.
https://doi.acm.org/10.1145/1753326.1753421
Reeder,
Robert W.,
Bauer,
Lujo,
Cranor,
Lorrie F.,
Reiter,
Michael K.,
Vaniea,
Kami
(2011):
More than skin deep: measuring effects of the underlying model on access-control system us.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2065-2074.
https://dx.doi.org/10.1145/1978942.1979243